Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 21:23
Static task
static1
Behavioral task
behavioral1
Sample
d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe
-
Size
151KB
-
MD5
d3ad4c380b0ddb12a8c5c257b2711d8c
-
SHA1
e93ec344f3438f9f2ce2bf42525b8c7dbab12b17
-
SHA256
e3b841147ca54c4dd61940fbbbbb9894d28a70a576f0c3f793dd9c70e5d22fe5
-
SHA512
bee59270e5af3ec6c5c64ee2228508be1d113a825ea1e750ef54a9202286b7ed873eafdc1165c83bca7ce0852e1bcf8bd356006e0a5fea1d2dd3849209df467d
-
SSDEEP
3072:2Eikpfs097Q/3qH6SD+npZxLG3Wv95HL2ezm7CPSoORUmN0k+4zPN8aRM1+8M+G+:2Eik197mVNG3G9107CPm7+4zV8B+8M4T
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 10 IoCs
pid Process 4960 Svchst.exe 2624 Svchst.exe 2580 Svchst.exe 4852 Svchst.exe 1184 Svchst.exe 4928 Svchst.exe 3264 Svchst.exe 3548 Svchst.exe 1764 Svchst.exe 2124 Svchst.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\Svchst.exe Svchst.exe File opened for modification C:\Windows\SysWOW64\Svchst.exe Svchst.exe File created C:\Windows\SysWOW64\Svchst.exe Svchst.exe File created C:\Windows\SysWOW64\Svchst.exe Svchst.exe File created C:\Windows\SysWOW64\Svchst.exe Svchst.exe File created C:\Windows\SysWOW64\Svchst.exe Svchst.exe File opened for modification C:\Windows\SysWOW64\Svchst.exe Svchst.exe File opened for modification C:\Windows\SysWOW64\Svchst.exe Svchst.exe File created C:\Windows\SysWOW64\Svchst.exe Svchst.exe File created C:\Windows\SysWOW64\Svchst.exe Svchst.exe File opened for modification C:\Windows\SysWOW64\Svchst.exe d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe File created C:\Windows\SysWOW64\Svchst.exe Svchst.exe File opened for modification C:\Windows\SysWOW64\Svchst.exe Svchst.exe File opened for modification C:\Windows\SysWOW64\Svchst.exe Svchst.exe File created C:\Windows\SysWOW64\Svchst.exe d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Svchst.exe Svchst.exe File opened for modification C:\Windows\SysWOW64\Svchst.exe Svchst.exe File created C:\Windows\SysWOW64\Svchst.exe Svchst.exe File created C:\Windows\SysWOW64\Svchst.exe Svchst.exe File opened for modification C:\Windows\SysWOW64\Svchst.exe Svchst.exe File opened for modification C:\Windows\SysWOW64\Svchst.exe Svchst.exe File opened for modification C:\Windows\SysWOW64\Svchst.exe Svchst.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchst.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4624 wrote to memory of 4960 4624 d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe 82 PID 4624 wrote to memory of 4960 4624 d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe 82 PID 4624 wrote to memory of 4960 4624 d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe 82 PID 4960 wrote to memory of 2624 4960 Svchst.exe 90 PID 4960 wrote to memory of 2624 4960 Svchst.exe 90 PID 4960 wrote to memory of 2624 4960 Svchst.exe 90 PID 2624 wrote to memory of 2580 2624 Svchst.exe 92 PID 2624 wrote to memory of 2580 2624 Svchst.exe 92 PID 2624 wrote to memory of 2580 2624 Svchst.exe 92 PID 2580 wrote to memory of 4852 2580 Svchst.exe 94 PID 2580 wrote to memory of 4852 2580 Svchst.exe 94 PID 2580 wrote to memory of 4852 2580 Svchst.exe 94 PID 4852 wrote to memory of 1184 4852 Svchst.exe 95 PID 4852 wrote to memory of 1184 4852 Svchst.exe 95 PID 4852 wrote to memory of 1184 4852 Svchst.exe 95 PID 1184 wrote to memory of 4928 1184 Svchst.exe 96 PID 1184 wrote to memory of 4928 1184 Svchst.exe 96 PID 1184 wrote to memory of 4928 1184 Svchst.exe 96 PID 4928 wrote to memory of 3264 4928 Svchst.exe 97 PID 4928 wrote to memory of 3264 4928 Svchst.exe 97 PID 4928 wrote to memory of 3264 4928 Svchst.exe 97 PID 3264 wrote to memory of 3548 3264 Svchst.exe 98 PID 3264 wrote to memory of 3548 3264 Svchst.exe 98 PID 3264 wrote to memory of 3548 3264 Svchst.exe 98 PID 3548 wrote to memory of 1764 3548 Svchst.exe 99 PID 3548 wrote to memory of 1764 3548 Svchst.exe 99 PID 3548 wrote to memory of 1764 3548 Svchst.exe 99 PID 1764 wrote to memory of 2124 1764 Svchst.exe 100 PID 1764 wrote to memory of 2124 1764 Svchst.exe 100 PID 1764 wrote to memory of 2124 1764 Svchst.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\Svchst.exeC:\Windows\system32\Svchst.exe 1088 "C:\Users\Admin\AppData\Local\Temp\d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\Svchst.exeC:\Windows\system32\Svchst.exe 1152 "C:\Windows\SysWOW64\Svchst.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\Svchst.exeC:\Windows\system32\Svchst.exe 1124 "C:\Windows\SysWOW64\Svchst.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\Svchst.exeC:\Windows\system32\Svchst.exe 1132 "C:\Windows\SysWOW64\Svchst.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\Svchst.exeC:\Windows\system32\Svchst.exe 1136 "C:\Windows\SysWOW64\Svchst.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\Svchst.exeC:\Windows\system32\Svchst.exe 1104 "C:\Windows\SysWOW64\Svchst.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\Svchst.exeC:\Windows\system32\Svchst.exe 1144 "C:\Windows\SysWOW64\Svchst.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\SysWOW64\Svchst.exeC:\Windows\system32\Svchst.exe 1148 "C:\Windows\SysWOW64\Svchst.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\Svchst.exeC:\Windows\system32\Svchst.exe 1156 "C:\Windows\SysWOW64\Svchst.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\Svchst.exeC:\Windows\system32\Svchst.exe 1140 "C:\Windows\SysWOW64\Svchst.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2124
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151KB
MD5d3ad4c380b0ddb12a8c5c257b2711d8c
SHA1e93ec344f3438f9f2ce2bf42525b8c7dbab12b17
SHA256e3b841147ca54c4dd61940fbbbbb9894d28a70a576f0c3f793dd9c70e5d22fe5
SHA512bee59270e5af3ec6c5c64ee2228508be1d113a825ea1e750ef54a9202286b7ed873eafdc1165c83bca7ce0852e1bcf8bd356006e0a5fea1d2dd3849209df467d